Compare commits
2 commits
27c37167d6
...
92cccd1799
Author | SHA1 | Date | |
---|---|---|---|
![]() |
92cccd1799 | ||
![]() |
f49eab2731 |
14 changed files with 305 additions and 6 deletions
|
@ -7,6 +7,7 @@ FROM debian:bookworm-slim
|
|||
RUN apt-get update && apt-get install -y apache2 openssl ca-certificates net-tools\
|
||||
&& rm -rf /var/lib/apt/lists/* \
|
||||
&& a2enmod ssl && a2ensite default-ssl
|
||||
|
||||
COPY 000-default.conf /etc/apache2/sites-available/000-default.conf
|
||||
COPY default-ssl.conf /etc/apache2/sites-available/default-ssl.conf
|
||||
COPY --from=build /app/dist /var/www/html
|
||||
|
|
29
apache/attacker/000-default.conf
Normal file
29
apache/attacker/000-default.conf
Normal file
|
@ -0,0 +1,29 @@
|
|||
<VirtualHost *:80>
|
||||
# The ServerName directive sets the request scheme, hostname and port that
|
||||
# the server uses to identify itself. This is used when creating
|
||||
# redirection URLs. In the context of virtual hosts, the ServerName
|
||||
# specifies what hostname must appear in the request's Host: header to
|
||||
# match this virtual host. For the default virtual host (this file) this
|
||||
# value is not decisive as it is used as a last resort host regardless.
|
||||
# However, you must set it for any further virtual host explicitly.
|
||||
#ServerName www.example.com
|
||||
|
||||
ServerAdmin webmaster@localhost
|
||||
Redirect permanent / https://localhost/
|
||||
|
||||
# Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
|
||||
# error, crit, alert, emerg.
|
||||
# It is also possible to configure the loglevel for particular
|
||||
# modules, e.g.
|
||||
#LogLevel info ssl:warn
|
||||
|
||||
ErrorLog ${APACHE_LOG_DIR}/error.log
|
||||
CustomLog ${APACHE_LOG_DIR}/access.log combined
|
||||
|
||||
# For most configuration files from conf-available/, which are
|
||||
# enabled or disabled at a global level, it is possible to
|
||||
# include a line for only one particular virtual host. For example the
|
||||
# following line enables the CGI configuration for this host only
|
||||
# after it has been globally disabled with "a2disconf".
|
||||
#Include conf-available/serve-cgi-bin.conf
|
||||
</VirtualHost>
|
132
apache/attacker/default-ssl.conf
Normal file
132
apache/attacker/default-ssl.conf
Normal file
|
@ -0,0 +1,132 @@
|
|||
<IfModule mod_ssl.c>
|
||||
<VirtualHost _default_:443>
|
||||
ServerAdmin webmaster@localhost
|
||||
|
||||
DocumentRoot /var/www/html
|
||||
|
||||
# Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
|
||||
# error, crit, alert, emerg.
|
||||
# It is also possible to configure the loglevel for particular
|
||||
# modules, e.g.
|
||||
#LogLevel info ssl:warn
|
||||
|
||||
ErrorLog ${APACHE_LOG_DIR}/error.log
|
||||
CustomLog ${APACHE_LOG_DIR}/access.log combined
|
||||
|
||||
# For most configuration files from conf-available/, which are
|
||||
# enabled or disabled at a global level, it is possible to
|
||||
# include a line for only one particular virtual host. For example the
|
||||
# following line enables the CGI configuration for this host only
|
||||
# after it has been globally disabled with "a2disconf".
|
||||
#Include conf-available/serve-cgi-bin.conf
|
||||
|
||||
# SSL Engine Switch:
|
||||
# Enable/Disable SSL for this virtual host.
|
||||
SSLEngine on
|
||||
|
||||
# A self-signed (snakeoil) certificate can be created by installing
|
||||
# the ssl-cert package. See
|
||||
# /usr/share/doc/apache2/README.Debian.gz for more info.
|
||||
# If both key and certificate are stored in the same file, only the
|
||||
# SSLCertificateFile directive is needed.
|
||||
SSLCertificateFile /etc/ssl/certs/ssl-cert-snakeoil.pem
|
||||
SSLCertificateKeyFile /etc/ssl/private/ssl-cert-snakeoil.key
|
||||
|
||||
# Server Certificate Chain:
|
||||
# Point SSLCertificateChainFile at a file containing the
|
||||
# concatenation of PEM encoded CA certificates which form the
|
||||
# certificate chain for the server certificate. Alternatively
|
||||
# the referenced file can be the same as SSLCertificateFile
|
||||
# when the CA certificates are directly appended to the server
|
||||
# certificate for convinience.
|
||||
#SSLCertificateChainFile /etc/apache2/ssl.crt/server-ca.crt
|
||||
|
||||
# Certificate Authority (CA):
|
||||
# Set the CA certificate verification path where to find CA
|
||||
# certificates for client authentication or alternatively one
|
||||
# huge file containing all of them (file must be PEM encoded)
|
||||
# Note: Inside SSLCACertificatePath you need hash symlinks
|
||||
# to point to the certificate files. Use the provided
|
||||
# Makefile to update the hash symlinks after changes.
|
||||
#SSLCACertificatePath /etc/ssl/certs/
|
||||
#SSLCACertificateFile /etc/apache2/ssl.crt/ca-bundle.crt
|
||||
|
||||
# Certificate Revocation Lists (CRL):
|
||||
# Set the CA revocation path where to find CA CRLs for client
|
||||
# authentication or alternatively one huge file containing all
|
||||
# of them (file must be PEM encoded)
|
||||
# Note: Inside SSLCARevocationPath you need hash symlinks
|
||||
# to point to the certificate files. Use the provided
|
||||
# Makefile to update the hash symlinks after changes.
|
||||
#SSLCARevocationPath /etc/apache2/ssl.crl/
|
||||
#SSLCARevocationFile /etc/apache2/ssl.crl/ca-bundle.crl
|
||||
|
||||
# Client Authentication (Type):
|
||||
# Client certificate verification type and depth. Types are
|
||||
# none, optional, require and optional_no_ca. Depth is a
|
||||
# number which specifies how deeply to verify the certificate
|
||||
# issuer chain before deciding the certificate is not valid.
|
||||
#SSLVerifyClient require
|
||||
#SSLVerifyDepth 10
|
||||
|
||||
# SSL Engine Options:
|
||||
# Set various options for the SSL engine.
|
||||
# o FakeBasicAuth:
|
||||
# Translate the client X.509 into a Basic Authorisation. This means that
|
||||
# the standard Auth/DBMAuth methods can be used for access control. The
|
||||
# user name is the `one line' version of the client's X.509 certificate.
|
||||
# Note that no password is obtained from the user. Every entry in the user
|
||||
# file needs this password: `xxj31ZMTZzkVA'.
|
||||
# o ExportCertData:
|
||||
# This exports two additional environment variables: SSL_CLIENT_CERT and
|
||||
# SSL_SERVER_CERT. These contain the PEM-encoded certificates of the
|
||||
# server (always existing) and the client (only existing when client
|
||||
# authentication is used). This can be used to import the certificates
|
||||
# into CGI scripts.
|
||||
# o StdEnvVars:
|
||||
# This exports the standard SSL/TLS related `SSL_*' environment variables.
|
||||
# Per default this exportation is switched off for performance reasons,
|
||||
# because the extraction step is an expensive operation and is usually
|
||||
# useless for serving static content. So one usually enables the
|
||||
# exportation for CGI and SSI requests only.
|
||||
# o OptRenegotiate:
|
||||
# This enables optimized SSL connection renegotiation handling when SSL
|
||||
# directives are used in per-directory context.
|
||||
#SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire
|
||||
<FilesMatch "\.(cgi|shtml|phtml|php)$">
|
||||
SSLOptions +StdEnvVars
|
||||
</FilesMatch>
|
||||
<Directory /usr/lib/cgi-bin>
|
||||
SSLOptions +StdEnvVars
|
||||
</Directory>
|
||||
|
||||
# SSL Protocol Adjustments:
|
||||
# The safe and default but still SSL/TLS standard compliant shutdown
|
||||
# approach is that mod_ssl sends the close notify alert but doesn't wait for
|
||||
# the close notify alert from client. When you need a different shutdown
|
||||
# approach you can use one of the following variables:
|
||||
# o ssl-unclean-shutdown:
|
||||
# This forces an unclean shutdown when the connection is closed, i.e. no
|
||||
# SSL close notify alert is send or allowed to received. This violates
|
||||
# the SSL/TLS standard but is needed for some brain-dead browsers. Use
|
||||
# this when you receive I/O errors because of the standard approach where
|
||||
# mod_ssl sends the close notify alert.
|
||||
# o ssl-accurate-shutdown:
|
||||
# This forces an accurate shutdown when the connection is closed, i.e. a
|
||||
# SSL close notify alert is send and mod_ssl waits for the close notify
|
||||
# alert of the client. This is 100% SSL/TLS standard compliant, but in
|
||||
# practice often causes hanging connections with brain-dead browsers. Use
|
||||
# this only for browsers where you know that their SSL implementation
|
||||
# works correctly.
|
||||
# Notice: Most problems of broken clients are also related to the HTTP
|
||||
# keep-alive facility, so you usually additionally want to disable
|
||||
# keep-alive for those clients, too. Use variable "nokeepalive" for this.
|
||||
# Similarly, one has to force some clients to use HTTP/1.0 to workaround
|
||||
# their broken HTTP/1.1 implementation. Use variables "downgrade-1.0" and
|
||||
# "force-response-1.0" for this.
|
||||
# BrowserMatch "MSIE [2-6]" \
|
||||
# nokeepalive ssl-unclean-shutdown \
|
||||
# downgrade-1.0 force-response-1.0
|
||||
|
||||
</VirtualHost>
|
||||
</IfModule>
|
|
@ -7,9 +7,13 @@ COPY ./index1.html /var/www/html/
|
|||
|
||||
RUN apt-get update && apt-get install -y dsniff net-tools apache2 \
|
||||
&& rm -rf /var/lib/apt/lists/* \
|
||||
&& a2enmod ssl && a2ensite default-ssl \
|
||||
&& apache2ctl start
|
||||
|
||||
COPY 000-default.conf /etc/apache2/sites-available/000-default.conf
|
||||
COPY default-ssl.conf /etc/apache2/sites-available/default-ssl.conf
|
||||
|
||||
|
||||
# CMD ["arpspoof", "-i", "eth0", "-t", "172.21.0.4", "-r", "172.21.0.3"]
|
||||
# arpspoof -i eth0 -t 172.21.0.4 -r 172.21.0.3
|
||||
|
||||
CMD ["arpspoof", "-i", "eth0", "-t", "webserver", "-r", "webserver"]
|
22
apache/attacker/ssl/CA.crt
Normal file
22
apache/attacker/ssl/CA.crt
Normal file
|
@ -0,0 +1,22 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIDtTCCAp2gAwIBAgIUK7ZkpzfUVfYQDNMbprdvcf3U9xUwDQYJKoZIhvcNAQEL
|
||||
BQAwajELMAkGA1UEBhMCRlIxETAPBgNVBAgMCEJyZXRhZ25lMQ8wDQYDVQQHDAZW
|
||||
YW5uZXMxDzANBgNVBAoMBkVOU0lCUzEUMBIGA1UECwwLM0EgQ3liZXJsb2cxEDAO
|
||||
BgNVBAMMB0t1cmlhbnQwHhcNMjUwMTIxMTA0MTMwWhcNMjYwMTIxMTA0MTMwWjBq
|
||||
MQswCQYDVQQGEwJGUjERMA8GA1UECAwIQnJldGFnbmUxDzANBgNVBAcMBlZhbm5l
|
||||
czEPMA0GA1UECgwGRU5TSUJTMRQwEgYDVQQLDAszQSBDeWJlcmxvZzEQMA4GA1UE
|
||||
AwwHS3VyaWFudDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANY6Pp65
|
||||
4B6v7Idp240zRdxdZQlvTKuBQZh00wPWnOBP0INGrJhcDNUnjSe7DfNT8KRBXr5M
|
||||
8KQLoI4H+ZO0solaBfzwwVAXvMX5IOCXAkpRHX+VvIAA/OAa7x/58XJKlD1mQJSr
|
||||
MLbJqnPvtbWb/NsAIc4xhWGDtNV1MzvBgftMG68TSC5Pa6hUmZtu5V3T/oJNQPl5
|
||||
P0UcX6zPkf7g9fm0IK9ZkwHCGkMO79Co/2dUkA317jzT7bTG1fPuEeOEVpLbiAek
|
||||
g/ZViwW2r4JxzcGh00nfSxx3ofmo8Aa1mvUkfue5c9dgX/+tu1s6nJZCtM+VZ4G/
|
||||
nlGYmk2l4wDXjhkCAwEAAaNTMFEwHQYDVR0OBBYEFOlMN1MNCYcXakm4TM021lQj
|
||||
P4BKMB8GA1UdIwQYMBaAFOlMN1MNCYcXakm4TM021lQjP4BKMA8GA1UdEwEB/wQF
|
||||
MAMBAf8wDQYJKoZIhvcNAQELBQADggEBAF/iHere6x/4m03ti5Bg7NABOFar98VU
|
||||
DKo1ioE7NZ/S7H03Uej+wLugqfK3xdMER2KG9j3GBdS9g6kEnsQCxYejCcKpmCiW
|
||||
ed+Y0eGZLojSGzfDBn8j74u+6ksRunvvNEi6BqWp7lvphZ/+Om7yo2JnQOW7E2KL
|
||||
lo66bCyk9aDzyi6gWgx0Orkr5i2X5JqpxCvvmIeiyfUBmNPqmbLPPWFqg+bpqkOu
|
||||
ehUH11h4MrT2E221etpJr4OSDb8TvdvyoWQVoT1fFZm1D9h01GU+wcupHOhfO1Y8
|
||||
u0YG/gu841L6GtmBXcTfOW/xQONATcYLHxP648HbC1fjZughQjEfYe8=
|
||||
-----END CERTIFICATE-----
|
28
apache/attacker/ssl/CA.key
Normal file
28
apache/attacker/ssl/CA.key
Normal file
|
@ -0,0 +1,28 @@
|
|||
-----BEGIN PRIVATE KEY-----
|
||||
MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQDWOj6eueAer+yH
|
||||
aduNM0XcXWUJb0yrgUGYdNMD1pzgT9CDRqyYXAzVJ40nuw3zU/CkQV6+TPCkC6CO
|
||||
B/mTtLKJWgX88MFQF7zF+SDglwJKUR1/lbyAAPzgGu8f+fFySpQ9ZkCUqzC2yapz
|
||||
77W1m/zbACHOMYVhg7TVdTM7wYH7TBuvE0guT2uoVJmbbuVd0/6CTUD5eT9FHF+s
|
||||
z5H+4PX5tCCvWZMBwhpDDu/QqP9nVJAN9e480+20xtXz7hHjhFaS24gHpIP2VYsF
|
||||
tq+Ccc3BodNJ30scd6H5qPAGtZr1JH7nuXPXYF//rbtbOpyWQrTPlWeBv55RmJpN
|
||||
peMA144ZAgMBAAECggEACP4S6NjGlqMt25VO+QNg+FoXRqkcX8qiNUMaJHwaw7O1
|
||||
/fy2fALJKx1o6HUKpd8tJ8fysSxLoac3Sx78k/2uzOMxgyecBb+pVeoaPjM4jmQP
|
||||
R+7CJeFkvAeFaCM2xmRpCpbDOTpiZhnbBNjYGNJ+b7b2tFAR2EEOEzPDPcvmp+S7
|
||||
TNDPEmj+FpESRhjUM5KxCYNKjJaHr4qRZT0Til062hgoyU6LTv9onDfXKU0ooMcz
|
||||
YQBrdlZDecQa3fN4V2xM+IQS5sLXV55v2VWpU7IQoKQEkBajmGrI5xJP+rAgZQHE
|
||||
gvleZdcw+vPDqIb1Y5t1/9u6OY6fSXDvfjULkEr/zQKBgQDyJjHz2xJhAVEeFc2A
|
||||
cDbO10ChuPVBgd/drRNqT+9GLdzlSSzcxVeyVy8pfX/izdCPkKzMQp3P2qcB6tHQ
|
||||
0x3RWNqfNZpi8qoObEEsAgzou7rpBx4mJyowcxyhE3CYdKYomcfl03ESfu8/5lby
|
||||
kjJhKSdyLNkrEnEBXnJILphmRwKBgQDiezDPgygmhHl+ZB7Osli7g5ADTLLd1mHs
|
||||
MfEgAv75R/pTXU2wmiaCwa1lQMxu9gfBkGGQRcybefE9pnBB6VmMgIlipcSy4o/l
|
||||
9hismXup3bv/ME91QuBxocs10yewacXBt2NsB7H+q5L3wPPdJQUae73i+REtioKd
|
||||
A/8MgWu4nwKBgQDwVranuZ0xSNRRTwSL4VSU0ZKlsWVDonsmk308vJ/ZgPXJYWq0
|
||||
qO4U5XG69YQ0AWFqzQalKc1mmze9sGqVoKTsvwsmkFZutTnSXOIGovZbHNE0Lste
|
||||
xOqb8fTNbvUHbGfqzk9YrheBaxldy+oqkq6MPwOW0CqwFHqzCCHXwN+kSwKBgQCl
|
||||
BvLYIk+9UUZeDIJORrJVYFYtsVOcRbxwqSt0EfrMleAXoqMbjheFq663WvIb4HZi
|
||||
Wtxcjh+7Iq3gKEkgHfK8aGSzVurvFhuYiywLiIMNkZ6NIhyj6yk0Y5p5C/WdnFUX
|
||||
BJQTgb/3O/oJQbXwbCs90vDYVHhp4MWvt9u+twdRLQKBgQCtwWvDoBIilveOXteg
|
||||
H/YokrH89EcCQ2d7MTdN3VZ2pWlhmpRVkkZ23eDP3xvv62oLCH7BU0FuWiAGtbrm
|
||||
7CPqx9dfDrQIOaQowxas2OOn2yfam1/lsf4zQXR8Wtjuo9t2Kuw+8GeSUYHoc3pa
|
||||
Tynut9OeyTuC2iv1a3/wFX2W5Q==
|
||||
-----END PRIVATE KEY-----
|
1
apache/attacker/ssl/CA.srl
Normal file
1
apache/attacker/ssl/CA.srl
Normal file
|
@ -0,0 +1 @@
|
|||
0385B4255453463D21169C944EB49D2A1F444E2A
|
20
apache/attacker/ssl/cert.crt
Normal file
20
apache/attacker/ssl/cert.crt
Normal file
|
@ -0,0 +1,20 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIDWzCCAkMCFAOFtCVUU0Y9IRaclE60nSofRE4qMA0GCSqGSIb3DQEBCwUAMGox
|
||||
CzAJBgNVBAYTAkZSMREwDwYDVQQIDAhCcmV0YWduZTEPMA0GA1UEBwwGVmFubmVz
|
||||
MQ8wDQYDVQQKDAZFTlNJQlMxFDASBgNVBAsMCzNBIEN5YmVybG9nMRAwDgYDVQQD
|
||||
DAdLdXJpYW50MB4XDTI1MDEyMTEwNDE1NloXDTI2MDEyMTEwNDE1NlowajELMAkG
|
||||
A1UEBhMCRlIxETAPBgNVBAgMCEJyZXRhZ25lMQ8wDQYDVQQHDAZWYW5uZXMxDzAN
|
||||
BgNVBAoMBkVOU0lCUzEUMBIGA1UECwwLM0EgQ3liZXJsb2cxEDAOBgNVBAMMB0t1
|
||||
cmlhbnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCdOL8sHJvggBas
|
||||
dF6wJGPpIf8/S4SDQItdBbFTJhigNtec9lA/ZAhDYXtH+9nMfCwsQTeHIpN2AA76
|
||||
MJRL7Jq9Y4wyiwLxkig4nfBbNuNqwbR4h7YxWP+wk5G7bLgG4PSq87lHLN06qF+1
|
||||
LzpacosT3U4+9zHMgPvm4907pNzBzae160Zsskwc22Ku+SFvto+sm4/WFqu/qqif
|
||||
OIjWeEsLEX8vPigDCuL7IBsldrxbkhH8UMRjigqj6SKYIjgmdFU2eFanCdFJazT2
|
||||
S1MD3UaVt11CEXcQaAQdktHtwNgdiLtpJaQml01LVZeKkOYf3ULbzu2SLstVr9sP
|
||||
wi6BybbfAgMBAAEwDQYJKoZIhvcNAQELBQADggEBAApJOGyqh38EI/rDoe8/8zC5
|
||||
AfO0X9fPNNrYpZhHwHepiZUyv0dLk1E0jvsKX0UWlSbuDuD1fzcEglFl8jm4z8lV
|
||||
16n9ZC/lQptjJso0FRbR6JMSRsFvS5lPlytnfY7VETI2jvbBDHxknqmyzKM7WM4Y
|
||||
xQSc03XPBClyQ3ut+Tb+5co+G4Rq5CYx2bI9snnmTC9S/4EeN0vVZORd3hyP9cII
|
||||
YsYKcqO1czexfoT4kaXghUB2Q4v0kBJe9wSWM8Zzq6Ka3YVkqpa7tOTRTZKgSfyO
|
||||
4rBAthzYqpu03WWACVQmXR+p0FQs/T82Ay8K+piWPsS5IjCY9uU+rSMhQyyOiuk=
|
||||
-----END CERTIFICATE-----
|
27
apache/attacker/ssl/private.key
Normal file
27
apache/attacker/ssl/private.key
Normal file
|
@ -0,0 +1,27 @@
|
|||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIEowIBAAKCAQEAnTi/LByb4IAWrHResCRj6SH/P0uEg0CLXQWxUyYYoDbXnPZQ
|
||||
P2QIQ2F7R/vZzHwsLEE3hyKTdgAO+jCUS+yavWOMMosC8ZIoOJ3wWzbjasG0eIe2
|
||||
MVj/sJORu2y4BuD0qvO5RyzdOqhftS86WnKLE91OPvcxzID75uPdO6Tcwc2ntetG
|
||||
bLJMHNtirvkhb7aPrJuP1harv6qonziI1nhLCxF/Lz4oAwri+yAbJXa8W5IR/FDE
|
||||
Y4oKo+kimCI4JnRVNnhWpwnRSWs09ktTA91GlbddQhF3EGgEHZLR7cDYHYi7aSWk
|
||||
JpdNS1WXipDmH91C287tki7LVa/bD8Iugcm23wIDAQABAoIBAGFCX5EMSamB04Tv
|
||||
oDva5yurallfgCQp44yyHtZPNOC3zH4/KbltSmdUgI0xUbTcA/+EgLNKQmq28oz3
|
||||
TGYDgl4ynOIPeMy0G8maerwSonDCT8BYQ+8XHWXAhGCritRGiVTP3QgYyuqkikBt
|
||||
bO3S+hJZzzPIe7gE+tAEmjFxdVc1x2w6ZoOKdIfHKaa75XQW6wwns3yB6TY/M0d8
|
||||
kAlas2+zhda77Wdyl0SQ2Tj2CfCtW8uKo1LAZB4SLW0qUPrP8FMIGSEtbJ6f536E
|
||||
3Ce+FJ/klyyFzlPpTlp2DIALP011vSx2vwiWzLziMyDGecxK9gdq22jmwLydKzrf
|
||||
L7CYiyECgYEA0EE40tdvmHPJiIuq5sQr3d5AKhc91VWQ33IkCBLMWlm6dHVrR/+j
|
||||
kvMLVNSUyAdLSzwcXC1/PR2O8Bsvx9bvgGCVs5AAvwXYPeKxUYmG4UigCHJkzsKZ
|
||||
m8jmQejdoyBk+u1SDQmGoe9PnpN7pdiBnW0pr0wn4QDX+Cpg8Y/o2YcCgYEAwURR
|
||||
JCxLuyKf58PfO5eSu2J2uoWXa/bysJiQwvPsA57yQPPhUlV3TxO8o5mxWlDFI1CW
|
||||
g+9y1YQXA8crJ3KO5u0yDx86Y23wz0FKZtVdbXwdCGZEg6tZxzaGwh4FRW1acY1K
|
||||
8vE7OGaZtH9zv9aTysx1ty8XiYj51W7xjq4pLekCgYAtMVoxdwsCnG3psdV+iqey
|
||||
WB64g56pgw4TT2O+VMX//WTXDPwg/brzksasvA0lc1/Fjd/hqQXpr1ZriJrP1TbY
|
||||
Nx2FgASJb61DkMRGG4Ant2jzLE/wBo7rHafKOcyPL+J6CbI6ngyXa6VtljfI/7jw
|
||||
/tWC8xXcYCB9/ERZZ49yVQKBgQCF7XipL4T/VjwnWIXOfvfwoIgUM1U+PO/qzp6q
|
||||
amvoCnJn7lj7PDykcNHtMSlEo+oo0cSsAve53IIyXQebm3hJsJ9a+VH16w7QILeV
|
||||
UVAf+b0IwA3EjK53LWLvC+ytMt1VCQuiFObr67Wh7hxhGSprg4ojeh++cExoyivc
|
||||
qvXgWQKBgC4ipxDnLI+aOxgGkj7G9cbik28dXuTnVO3pY5tls0ToMR3QJIuYbe80
|
||||
vVaZTwGqauCPUe6uF9lJq6d01iq0SJnQpyBmDQWJgRXFMFUN9AVx7N1Y8r8MBnH1
|
||||
lHRy+TkJ4sx0sIoZUvVWds1PhfFdQA1eEYU+8gpiaGny0/PJnvaw
|
||||
-----END RSA PRIVATE KEY-----
|
9
apache/attacker/ssl/public.key
Normal file
9
apache/attacker/ssl/public.key
Normal file
|
@ -0,0 +1,9 @@
|
|||
-----BEGIN PUBLIC KEY-----
|
||||
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnTi/LByb4IAWrHResCRj
|
||||
6SH/P0uEg0CLXQWxUyYYoDbXnPZQP2QIQ2F7R/vZzHwsLEE3hyKTdgAO+jCUS+ya
|
||||
vWOMMosC8ZIoOJ3wWzbjasG0eIe2MVj/sJORu2y4BuD0qvO5RyzdOqhftS86WnKL
|
||||
E91OPvcxzID75uPdO6Tcwc2ntetGbLJMHNtirvkhb7aPrJuP1harv6qonziI1nhL
|
||||
CxF/Lz4oAwri+yAbJXa8W5IR/FDEY4oKo+kimCI4JnRVNnhWpwnRSWs09ktTA91G
|
||||
lbddQhF3EGgEHZLR7cDYHYi7aSWkJpdNS1WXipDmH91C287tki7LVa/bD8Iugcm2
|
||||
3wIDAQAB
|
||||
-----END PUBLIC KEY-----
|
9
apache/attacker/ssl/public.pub
Normal file
9
apache/attacker/ssl/public.pub
Normal file
|
@ -0,0 +1,9 @@
|
|||
-----BEGIN PUBLIC KEY-----
|
||||
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnTi/LByb4IAWrHResCRj
|
||||
6SH/P0uEg0CLXQWxUyYYoDbXnPZQP2QIQ2F7R/vZzHwsLEE3hyKTdgAO+jCUS+ya
|
||||
vWOMMosC8ZIoOJ3wWzbjasG0eIe2MVj/sJORu2y4BuD0qvO5RyzdOqhftS86WnKL
|
||||
E91OPvcxzID75uPdO6Tcwc2ntetGbLJMHNtirvkhb7aPrJuP1harv6qonziI1nhL
|
||||
CxF/Lz4oAwri+yAbJXa8W5IR/FDEY4oKo+kimCI4JnRVNnhWpwnRSWs09ktTA91G
|
||||
lbddQhF3EGgEHZLR7cDYHYi7aSWkJpdNS1WXipDmH91C287tki7LVa/bD8Iugcm2
|
||||
3wIDAQAB
|
||||
-----END PUBLIC KEY-----
|
17
apache/attacker/ssl/request.csr
Normal file
17
apache/attacker/ssl/request.csr
Normal file
|
@ -0,0 +1,17 @@
|
|||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIICrzCCAZcCAQAwajELMAkGA1UEBhMCRlIxETAPBgNVBAgMCEJyZXRhZ25lMQ8w
|
||||
DQYDVQQHDAZWYW5uZXMxDzANBgNVBAoMBkVOU0lCUzEUMBIGA1UECwwLM0EgQ3li
|
||||
ZXJsb2cxEDAOBgNVBAMMB0t1cmlhbnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||
ggEKAoIBAQCdOL8sHJvggBasdF6wJGPpIf8/S4SDQItdBbFTJhigNtec9lA/ZAhD
|
||||
YXtH+9nMfCwsQTeHIpN2AA76MJRL7Jq9Y4wyiwLxkig4nfBbNuNqwbR4h7YxWP+w
|
||||
k5G7bLgG4PSq87lHLN06qF+1LzpacosT3U4+9zHMgPvm4907pNzBzae160Zsskwc
|
||||
22Ku+SFvto+sm4/WFqu/qqifOIjWeEsLEX8vPigDCuL7IBsldrxbkhH8UMRjigqj
|
||||
6SKYIjgmdFU2eFanCdFJazT2S1MD3UaVt11CEXcQaAQdktHtwNgdiLtpJaQml01L
|
||||
VZeKkOYf3ULbzu2SLstVr9sPwi6BybbfAgMBAAGgADANBgkqhkiG9w0BAQsFAAOC
|
||||
AQEAdCIKAKjz7Z0f8niI1IzaGT5FqcfxdzSaYE7Q3XCKROqDbECGcYauLQoz+MOV
|
||||
IBcJLibNgbA28u8Eb4oJjbxBt2mMywm41YnnKQOtbo5mOdO+W5AgFUsA/dK76Qoz
|
||||
agnF6DS8IYFHzcEfFEFayfb5/fHBR7erQwV7fMAD8aFe/Ej8utH8rRZPqAVxxM/J
|
||||
6sFXwntgbc9dcv0rV0u+boT1bw0MpLc/z4QDOSgpAlqqBL4pAGPw1Xc+3wsA8bfb
|
||||
LJDExEoX96GAdQREACp9U7kLJ3KxfC/8UCYDNoAUmWkeF3qxfL1PJmQqj4/9Lzn3
|
||||
DduAkqX71yJ5z21wRsTqlNsrWA==
|
||||
-----END CERTIFICATE REQUEST-----
|
|
@ -11,15 +11,14 @@ services:
|
|||
attacker:
|
||||
build: ./attacker
|
||||
container_name: attacker
|
||||
ports:
|
||||
- 5001:5001
|
||||
networks:
|
||||
- mynetwork
|
||||
privileged: true
|
||||
stdin_open: true
|
||||
depends_on:
|
||||
- webserver
|
||||
victim:
|
||||
build: docker/victim
|
||||
build: ./victim
|
||||
container_name: victim
|
||||
networks:
|
||||
- mynetwork
|
||||
|
@ -31,3 +30,4 @@ services:
|
|||
networks:
|
||||
mynetwork:
|
||||
external: false
|
||||
|
|
@ -1,5 +1,5 @@
|
|||
FROM debian:bookworm-slim
|
||||
RUN apt-get update && apt-get install -y curl python3 python3-pip \
|
||||
RUN apt-get update && apt-get install -y curl python3 python3-pip iputils-ping net-tools \
|
||||
&& rm -rf /var/lib/apt/lists/*
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue